The tie tia Core Status UI allows to two modes of authentication:
...
The configuration for authentication of tia Core Status UI has to be made in the application.yml
file.
<Documentation link to application.yml explanation, how to specify, what’s inside>
...
as application-wide setting, see tia Core Configuration Basics.
Configuring tia Status UI for Basic Authentication
The location in the YML-hierarchy of the setting for user name and password can be seen below.
...
...
Following parameters needs to be specified for basic authentication:
webapp.security.auth.type=basic
webapp.security.auth.basic.username=<username>
webapp-security.auth.basic.password=<password hash>
When the basic authentication (default) is used, but the password is not configured here, the tia Core Status UI application will generate random password at startup which can be looked up from the container logs.
...
Code Block |
---|
2023-09-01 13:49:21.651 [ / ] [W] [ main] .k.a.s.c.SecurityConfiguration.logGeneratedPassword ( 322) : |======================================================================| 2023-09-01 13:49:21.651 [ / ] [W] [ main] .k.a.s.c.SecurityConfiguration.logGeneratedPassword ( 323) : | Temporary generated password for the status webapp: 5KdJZ7EKQ.p0%etp | 2023-09-01 13:49:21.651 [ / ] [W] [ main] .k.a.s.c.SecurityConfiguration.logGeneratedPassword ( 324) : |======================================================================| |
The password is expected as bcrypt hash value in the application.yml file.hash in the configuration has to be the bcrypt (type $2a$)-encrypted hash value of the password.
Example value:
Code Block |
---|
$2a$10$5E1KpGIKSq6xuWmGf92bheB17V0l4fEMnVmYPqhWiazKddcx1TF/e |
Configuring tia Status UI for OAuth2 Authentication
...
registration of the application at the OAuth2 Authorization Server
configuration of these parameters in the application.yml file (see example below):
Authentication type
authenticationEndpointUrl
clientId
redirectUrl
...
-wide-settings:
webapp.security.auth.type=oauth2
webapp.security.auth.oauth2.authenticationEndpointUrl=<OAuth2 endpoint URL>
webapp-security.auth.oauth2.clientId=<OAuth2 client id>
webapp-security.auth.oauth2.redirectUrl=<local URL to /info/login-callback>